Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Privacy and integrity-preserving range queries
Top-k Query Result Completeness Verification.pdf